Monday, March 6, 2023
HomeCyber SecurityLastPass Reveals Second Assault Leading to Breach of Encrypted Password Vaults

LastPass Reveals Second Assault Leading to Breach of Encrypted Password Vaults


Feb 28, 2023Ravie LakshmananPassword Safety / Information Breach

LastPass, which in December 2022 disclosed a extreme information breach that allowed menace actors to entry encrypted password vaults, stated it occurred because of the identical adversary launching a second assault on its methods.

The corporate stated one in every of its DevOps engineers had their private dwelling pc hacked and contaminated with a keylogger as a part of a sustained cyber assault that exfiltrated delicate information from its Amazon AWS cloud storage servers.

“The menace actor leveraged data stolen throughout the first incident, data accessible from a third-party information breach, and a vulnerability in a third-party media software program package deal to launch a coordinated second assault,” the password administration service stated.

This intrusion focused the corporate’s infrastructure, assets, and the aforementioned worker from August 12, 2022, to October 26, 2022. The unique incident, then again, ended on August 12, 2022.

The August breach noticed the intruders accessing supply code and proprietary technical data from its improvement surroundings by the use of a single compromised worker account.

In December 2022, LastPass revealed that the menace actor leveraged the stolen data to entry a cloud-based storage surroundings and pay money for “sure components of our clients’ data.”

Later in the identical month, the unknown attacker was disclosed as having obtained entry to a backup of buyer vault information that it stated was protected utilizing 256-bit AES encryption. It didn’t reveal how current the backup was.

GoTo, the guardian firm of LastPass, additionally fessed as much as a breach final month stemming from unauthorized entry to the third-party cloud storage service.

Now based on the corporate, the menace actor engaged in a brand new sequence of “reconnaissance, enumeration, and exfiltration actions” geared toward its cloud storage service between August and October 2022.

“Particularly, the menace actor was capable of leverage legitimate credentials stolen from a senior DevOps engineer to entry a shared cloud storage surroundings,” LastPass stated, including the engineer “had entry to the decryption keys wanted to entry the cloud storage service.”

This allowed the malicious actor to acquire entry to the AWS S3 buckets that housed backups of LastPass buyer and encrypted vault information, it additional famous.

Uncover the Newest Malware Evasion Techniques and Prevention Methods

Able to bust the 9 most harmful myths about file-based assaults? Be part of our upcoming webinar and turn into a hero within the battle towards affected person zero infections and zero-day safety occasions!

RESERVE YOUR SEAT

The worker’s passwords are stated to have been siphoned by focusing on the person’s dwelling pc and leveraging a “susceptible third-party media software program package deal” to attain distant code execution and plant a keylogger software program.

“The menace actor was capable of seize the worker’s grasp password because it was entered, after the worker authenticated with MFA, and achieve entry to the DevOps engineer’s LastPass company vault,” LastPass stated.

LastPass didn’t reveal the identify of the third-party media software program used, however indications are that it may very well be Plex primarily based on the truth that it suffered a breach of its personal in late August 2022.

Within the aftermath of the incident, LastPass stated it upgraded its safety posture by rotating essential and excessive privilege credentials and reissuing certificates obtained by the menace actor, and that it utilized further S3 hardening measures to place in place logging and alerting mechanisms.

LastPass customers are extremely really useful to vary their grasp passwords and all of the passwords saved of their vaults to mitigate potential dangers, if not performed already.

Replace

Plex shared the next assertion with The Hacker Information after the publication of the story –

We now have not been contacted by LastPass so we can’t converse to the specifics of their incident. We take safety points very severely, and continuously work with exterior events who report points massive or small utilizing our tips and bug bounty program. When vulnerabilities are reported following accountable disclosure we handle them swiftly and totally, and we have by no means had a essential vulnerability printed for which there wasn’t already a patched model launched. And once we’ve had incidents of our personal, we have all the time chosen to speak them rapidly. We’re not conscious of any unpatched vulnerabilities, and as all the time, we invite individuals to reveal points to us following the rules linked above. Given current articles concerning the LastPass incident, though we aren’t conscious of any unpatched vulnerabilities, we now have reached out to LastPass to make sure.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments